CompTIA Security+ Question E-41

Which of the following means of wireless authentication is easily vulnerable to spoofing?

A. MAC Filtering
B. WPA – LEAP
C. WPA – PEAP
D. Enabled SSID

Answer: A

Explanation:
Each network interface on your computer or any other networked device has a unique MAC address. These MAC addresses are assigned in the factory, but you can easily change, or “spoof,” MAC addresses in software.

Networks can use MAC address filtering, only allowing devices with specific MAC addresses to connect to a network. This isn’t a great security tool because people can spoof their MAC addresses.

CompTIA A+ Core 2 Question J-79

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?

A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.

Correct Answer: C

CompTIA A+ Core 2 Question D-99

Which of the following can a technician implement to ensure that only company owned mobile devices can connect to the wireless network?

A. Deploy a script to auto-configure employees mobile devices wireless settings.
B. Configure MAC address filtering on the access points.
C. Implement a wireless policy and train all users.
D. Enable WPA2-Personal with a strong password.

Correct Answer: B

CompTIA A+ Core 2 Question D-93

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?

A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.

Correct Answer: C

Explanation:
The best way is to disable all switch ports when they are not utilized. Switch them on when you need them. This way, you can prevent external contractors from physically plugging devices in to company’s network jacks.